Blast triggers war of words ahead of Karnataka polls

[email protected] (Imran Khan, Tehelka)
April 21, 2013

Blast_triggersJUST A day after the Boston Marathon terror attack and less than a month after twin blasts rocked Hyderabad, 17 people were injured in a low-intensity blast near the Karnataka BJP's office in Bengaluru. Among the injured were 11 policemen who had been deployed there as it was the last day of filing nominations for the upcoming Assembly election on 5 May.

While the police are yet to ascertain who is behind the blast, suspicions are now being raised about the timing of the blast and who might possibly benefit from it.

“I was in my kitchen cooking, when I heard a deafening noise,” says Nanjamma, 43, who lives near the blast site. The explosion shattered the window panes of her house. “When I rushed outside, I saw cars engulfed in flames and bits of broken glass everywhere.”

Nine vehicles were damaged in the blast and the fire that followed. Police officials informed the media that the blast was caused by an IED (Improvised Explosive Device) mounted on a 100cc Yamaha motorcycle (chassis number: 1108F001-568/ registration number: TN-22R- 3769). The police, however, are yet to fathom whether the blast was triggered by a timer mounted on the vehicle or through a remote device.

A police van parked close to the blast site too was damaged. The explosion occurred in the Malleswaram residential area of north Bengaluru, about 100 metres from the newly inaugurated state BJP office, christened Jagannath Bhavan. “There were 20 of us on duty when the blast happened. Eight of us were in the van, but the rest were outside,” says Vishweshwaraiyya, 50, a head constable with the Karnataka State Reserve Police Force who was admitted at the KC General Hospital along with 10 of his colleagues.

Among the injured was Assistant Sub-Inspector BC Kunyappa, who received several cuts from shards of glass on the left side of the body, from neck to ankle. “I was reading the newspaper inside a police jeep when I heard a sound, like the bursting of crackers, followed by thick smoke,” he says. “I jumped out from the vehicle, otherwise I would have been dead.” Asked whether he saw anybody parking the bike, he says he has no idea.

Besides the policemen, six others, including three women, were also injured.

An unseemly blame game has broken out between the BJP and the Congress over the blast with both sides politicising the issue. Karnataka Home Minister R Ashok, who reached the spot immediately after the blast, declared it an act of terror intended to hurt the state BJP leaders. He even speculated that it might have been intended to “celebrate” the third anniversary of the Chinnaswamy Stadium blasts of 2010 as both of the incidents occurred on 17 April while the Indian Premier League season was on.

BJP state spokesperson S Prakash too said the bomb was definitely intended to hurt party workers and state BJP leaders as it was nomination day and activists of the party would be milling around the party office.

Opposition leaders, however, slammed the BJP for the remarks. Congress leader and Leader of the Opposition Siddaramaiah called the blasts a political gimmick and held the state government responsible for it. Raising suspicion about the timing of the blast, Congress MP H Vishwanath said the role of the Rashtriya Swayamsewak Sangh could not be ruled out and demanded an inquiry that should submit its findings before the Assembly election.

So was it an act of terror? “Though no shrapnel or splinters were found in the bodies of the injured, nothing conclusive has come out so far,” says Joint Commissioner of Police (Law & Order) Pranab Mohanty. The only fact that seems to support the Congress' view is that the bike was parked 100 metres away from the BJP office and seemed designed for minimum damage.

While all interpretations of the blast are premature, it's interesting to note that past experiences have shown that similar acts were used for a political purpose. In the thick of elections in May 2008, a low-intensity bomb exploded in the district court of Dharward, 429 km west of Bengaluru. Initially, the Students Islamic Movement of India was deemed to be behind the blasts but later investigations showed the hand of extremist Hindutva groups. However, given that there have been blasts elsewhere in the country that have involved Muslim extremists, the sanest course might be to rush to no conclusions.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 17,2020

As millions of people get hooked to online dating platforms, their proliferation has led to online romance scams becoming a modern form of fraud that have spread in several societies along with the development of social media like Facebook Dating, warn researchers.

For example, extra-marital dating app Gleeden has crossed 10 lakh users in India in COVID-19 times while dating apps like Tinder and Bumble have gained immense popularity.

According to researchers from University of Siena and Scotte University Hospital led by Dr Andrea Pozza, via a fictitious Internet profile, the scammer develops a romantic relationship with the victim for 6-8 months, building a deep emotional bond to extort economic resources in a manipulative dynamic.

"There are two notable features: on the one hand, the double trauma of losing money and a relationship, on the other, the victim's shame upon discovery of the scam, an aspect that might lead to underestimation of the number of cases," the authors wrote in a paper published in the journal Clinical Practice & Epidemiology in Mental Health.

Around 1,400 dating sites/chats have been created over the last decade in North America alone. In the UK, 23 per cent of Internet users have met someone online with whom they had a romantic relationship for a certain period and even 6 per cent of married couples met through the web.

"The online dating industry has given rise to new forms of pathologies and crime, said the authors.

The results showed that 63 per cent of social media users and 3 per cent of the general population reported having been a victim at least once.

Women, middle-aged people, and individuals with higher tendencies to anxiety, romantic idealization of affective relations, impulsiveness and susceptibility to relational addiction are at higher risk of being victims of the scam.

Online romance scams are, in other words, relationships constructed through websites for the purpose of deceiving unsuspecting victims in order to extort money from them.

The scammer always acts empathetically and attempts to create the impression in the victim that the two are perfectly synced in their shared view of life.

"The declarations of the scammer become increasingly affectionate and according to some authors, a declaration of love is made within two weeks from initial contact," the study elaborated.

After this hookup phase, the scammer starts talking about the possibility of actually meeting up, which will be postponed several times due to apparently urgent problems or desperate situations such as accidents, deaths, surgeries or sudden hospitalizations for which the unwitting victim will be manipulated into sending money to cover the momentary emergency.

Using the strategy of "testing-the-water", the scammer asks the victim for small gifts, usually to ensure the continuance of the relationship, such as a webcam, which, if successful, leads to increasingly expensive gifts up to large sums of money.

When the money arrives from the victim, the scammer proposes a new encounter.

The request for money can also be made to cover the travel costs involved in the illusory meeting. In this phase, the victim may start having second thoughts or showing doubt about the intentions of the partner and gradually decide to break off the relationship.

"In other cases, the fraudulent relationship continues or even reinforces itself as the victim, under the influence of ambivalent emotions of ardor and fear of abandonment and deception, denies or rationalizes doubts to manage their feelings," said the study.

In some cases, the scammer may ask the victim to send intimate body photos that will be used as a sort of implicit blackmail to further bind the victim to the scammer.

Once the scam is discovered, the emotional reaction of the victim may go through various phases: feelings of shock, anger or shame, the perception of having been emotionally violated (a kind of emotional rape), loss of trust in people, a sensation of disgust towards oneself or the perpetrator of the crime and a feeling of mourning.

"Understanding the psychological characteristics of victims and scammers will allow at-risk personality profiles to be identified and prevention strategies to be developed," the authors suggested.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 24,2020

New Delhi, Jun 24: The Centre has made it mandatory for sellers to enter the 'Country of Origin' while registering all new products on government e-marketplace (GeM).

The e-marketplace is a special purpose vehicle (SPV) under the Ministry of Commerce and Industry which facilitates the entry of small local sellers in public procurement, while implementing 'Make in India' and MSE Purchase Preference Policies of the Centre.

Accordingly, the ministry said the move has been made to promote 'Make in India' and 'Atma Nirbhar Bharat'.

The provision has been enabled via the introduction of new features on GeM.

Besides the registration process, the new feature also reminds sellers who have already uploaded their products, to disclose their products' 'Country of Origin' details.

The ministry further said that failing to disclose the detail will lead to removal of the products from the e-marketplace.

"GeM has taken this significant step to promote 'Make in India' and 'Aatmanirbhar Bharat'," the ministry said in a statement.

"GeM has also enabled a provision for indication of the percentage of local content in products. With this new feature, now, the 'Country of Origin' as well as the local content percentage are visible in the marketplace for all items. More importantly, the 'Make in India' filter has now been enabled on the portal. Buyers can choose to buy only those products that meet the minimum 50 per cent local content criteria."

In case of bids, the ministry said that buyers can now reserve any bid for a "Class I Local suppliers. For those bids below Rs 200 crore, only Class I and Class II Local Suppliers are eligible to bid, with Class I supplier getting purchase preference".

In addition to this, the Department for Promotion of Industry and Internal Trade (DPIIT) has reportedly called for a meeting with all e-commerce companies such as Amazon and Flipkart to display the country of origin on the products sold on their platform, as well as the extent of value added in India.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.